Blockchain-Backed Verification Systems for Enhanced Interoperability and Trust in Managing Legal Documents across Multi-Cloud Environments

Main Article Content

Akula .V.S. Siva Rama Rao, Tulasi Kavarakuntla, Sunitha Kanipakam, Thejovathi Murari, Kalangi Praveen Kumar, Bakkala Santha Kumar

Abstract

As cloud computing continues to evolve, the imperative for secure and interoperable legal document management becomes increasingly critical. This research paper introduces a blockchain-backed verification system designed to enhance security, interoperability, and trust in managing legal documents across multi-cloud environments. We present a decentralized framework that leverages blockchain technology for authenticating documents, ensuring their integrity and authenticity across different cloud platforms. Our multi-cloud framework facilitates seamless interoperability and flexible workflow management, while smart-contract-driven verification processes streamline validation and minimize security vulnerabilities. The implementation of this system has led to a notable improvement in document security, with a 100% reduction in security breach incidents and a 90% decrease in unauthorized access attempts. Audit processes have been optimized as well, achieving a 100% complete audit trail and reducing audit times by 80%. Moreover, the system has significantly enhanced user trust, demonstrated by a 50% increase in user satisfaction and a 300% rise in adoption rates. These advancements establish a resilient infrastructure for legal document management, promising a higher degree of security, operational efficiency, and trust, which are pivotal for the widespread acceptance and integration of cloud-based services in the legal domain.

Article Details

Section
Articles
Author Biography

Akula .V.S. Siva Rama Rao, Tulasi Kavarakuntla, Sunitha Kanipakam, Thejovathi Murari, Kalangi Praveen Kumar, Bakkala Santha Kumar

1Akula .V.S. Siva Rama Rao

2Tulasi Kavarakuntla

3 Sunitha Kanipakam

4Thejovathi Murari

5Kalangi Praveen Kumar

6*Bakkala Santha Kumar

1Associate Professor ,Dept. Of CSE ,Sasi Institute of Technology & Engineering ,Tadepalligudem-Andhra Pradesh, India ,

Email Id: shiva.akula@gmail.com 

244 Danes road ,Fallowfield ,Manchester ,United Kingdom, Email Id: tulasi.k22@gmail.com 

3Asst Professor ,Department of Law ,Sri Padmavati Mahila Visvavidyalayam ( women’s university), Tirupati -2, Andhra Pradesh,India.

Email Id: drsunithak30@gmail.com   

4Research Scholar, Computer Science and Engineering, Acharya Nagarjuna University , Guntur, Andhra Pradesh, India

Email Id: theju.scient@gmail.com 

5Assistant Professor, Department Of Information Technology, Anurag University, Hyderabad,India

Email Id: praveen0507@yahoo.com

6*Corresponding author: Assistant Professor,Dept. of Computer Science and Engineering,Koneru Lakshmaiah Education Foundation, Vaddeswaram, Guntur Dist.,Andhra Pradesh, India.
Email ID : santhakumar.bakkala@gmail.com

Copyright © JES 2023 on-line : journal.esrgroups.org

References

Abbadi, M. I. (2011). Clouds’ infrastructure taxonomy, properties, and management services. In Advances in Computing and Communications, Part IV, edited by A. Abraham, J. L. Mauri, J. Buford, J. Suzuki, and S. M. Thampi, Heidelberg: Springer-Verlag, 406-420.

Ayushi Singh, Gulafsha Shujaat, Isha Singh, Abhishek Tripathi, & Divya Thakur. (2019). A Survey of Blockchain Technology Security. International Journal of Computer Engineering in Research Trends, 6(4), 299–303.

Conti, M., Kuma, E. S., Lal, C., and Ruj, S. (2018). A survey on security and privacy issues of bitcoin. IEEE Communications Surveys and Tutorials. 20(4), 3416- 3452.

Omar Levano-Stella, Jonardo L. Lerios, & Mohamed Remaida. (2023). A Blockchain-based Approach for Securing IoT Devices in Smart Homes. International Journal of Computer Engineering in Research Trends, 10(10), 8–15.

M.Bhavsingh, K Samunnisa, S.K Khaza Shareef (2022), A Blockchain-based Approach for Securing Network Communications in IoT Environments. Macaw International Journal of Advanced Research in Computer Science and Engineering .8(1) .1-7

Halpin., H. and Piekarska, M. (2017). Introduction to security and privacy on the blockchain. In 2017 IEEE European Symposium on Security and Privacy Workshops (EuroS and PW), pp. 1-3, IEEE.

Kazim, M., Masood, R., and Shibli, M. A. (2013). Securing the virtual machine images in cloud computing. In Proceedings of the 6th International Conference on Security of Information and Networks, pp. 425-428.

Macrinici, D., Cartofeanu, C., and Gao, S. (2018). Smart contract applications within blockchain technology: A systematic mapping study. Telematics and Informatics, 35(8), 2337-2354.

Asep Bayu Dani Nandiyanto, Muhammad Aziz, M Bhavsingh.(2021). A Blockchain-based Approach for Securing IoT Devices in Smart Homes. Macaw International Journal of Advanced Research in Computer Science and Engineering .7(1) .1-8

Arpita Nusrat, Jasni Mohamad Zain, Mohamed Lachgar, & M.Bhavsingh. (2023). Machine Learning Techniques for Detecting Anomalies in IoT Networks . International Journal of Computer Engineering in Research Trends, 10(10), 16–23.

Nguyen, G. T., & Kim, K. (2018). A survey about consensus algorithms used in blockchain. Journal of Information Processing Systems, 14(1), 101-128.

Zakaria Rahal, , Chekima Hamza(2023).A Blockchain-based Framework for Enhancing Security and Privacy in Cloud Computing. Macaw International Journal of Advanced Research in Computer Science and Engineering.9(1) .1-9

Plabon Bhandari Abhi , Kristelle Ann R. Torres, Tao Yusoff,K.Samunnisa .(2023).A Novel Lightweight Cryptographic Protocol for Securing IoT Devices . International Journal of Computer Engineering in Research Trends .10(10) .24-30

Asep Bayu Dani Nandiyanto, Chekima Hamza, Risti Ragadhita, Muhammad Aziz (2023).A Novel Framework for Enhancing Security in Software-Defined Networks. International Journal of Computer Engineering in Research Trends .10(11) .19-26

G.Chandra Sekhar, & P. Balamurugan. (2020). Block-Chain Compliance for IoT Security: A Survey. International Journal of Computer Engineering in Research Trends, 7(9), 23–33

Amirullah Abduh, Ade Mulianah, Besse Darmawati. (2023). A Machine Learning-based Approach for Enhancing Cybersecurity in Critical Infrastructure . Macaw International Journal of Advanced Research in Computer Science and Engineering .9(2) .1-8

Naveen Kumar Vrandani, & Deepak Mathur. (2022). Analysis & Prediction of Road Accident Data for NH-19/44. International Journal on Recent Technologies in Mechanical and Electrical Engineering, 9(2), 13–33. https://doi.org/10.17762/ijrmee.v9i2.366

N’guessan Patrice Akoguhi, & M.Bhavsingh. (2023). Blockchain Technology in Real Estate: Applications, Challenges, and Future Prospects. International Journal of Computer Engineering in Research Trends, 10(9), 16–21.

M. R. Arun, M. R. Sheeba, & F. Shabina Fred Rishma. (2020). Comparing BlockChain with other Cryptographic Technologies (DAG, Hashgraph, Holochain). International Journal of Computer Engineering in Research Trends, 7(4), 13–19.

Vishakha Shelke, Smit Khakhkhar, & Yash Jani. (2022). Fundraising through Blockchain. International Journal of Computer Engineering in Research Trends, 9(4), 73–78.

M, B. M., M, S., & S, H. (2023). Blockchain-Based Crowd funding Platform. International Journal of Computer Engineering in Research Trends, 10(5), 40–47.

Yedukondalu, G, Samunnisa, K., Bhavsingh, M., Raghuram, I. S. ., & Lavanya, A. . (2022). MOCF: A Multi-Objective Clustering Framework using an Improved Particle Swarm Optimization Algorithm. International Journal on Recent and Innovation Trends in Computing and Communication, 10(10), 143–154.

Ravikumar, G. ., Begum, Z. ., Kumar, A. S. ., Kiranmai, V., Bhavsingh, M., & Kumar, O. K. . (2022). Cloud Host Selection using Iterative Particle-Swarm Optimization for Dynamic Container Consolidation. International Journal on Recent and Innovation Trends in Computing and Communication, 10(1s), 247–253.

K., V. R. ., Yadav G., H. K. ., Basha P., H. ., Sambasivarao, L. V. ., Rao Y. V., 5Balarama K. ., & Bhavsingh , M. . (2023). Secure and Efficient Energy Trading using Homomorphic Encryption on the Green Trade Platform. International Journal of Intelligent Systems and Applications in Engineering, 12(1s), 345–360.

Nayomi, B. D. D. ., Mallika, S. S. ., T., S. ., G., J. ., Laxmikanth, P. ., & Bhavsingh, M. . (2023). A Cloud-Assisted Framework Utilizing Blockchain, Machine Learning, and Artificial Intelligence to Countermeasure Phishing Attacks in Smart Cities. International Journal of Intelligent Systems and Applications in Engineering, 12(1s), 313–327.

P.Venkata Krishna, K Venkatesh Sharma,A MallaReddy.(2023). A Machine Learning-based Approach for Detecting Network Intrusions in Large-scale Networks. International Journal of Computer Engineering in Research Trends, 10(2), 61–68

M.Bhavsingh,K.Samunnisa,B.Pannalal.(2023). A Blockchain-based Approach for Securing Network Communications in IoT Environments. Akhil Srinivas P, Karan Jain, Swarnalatha P.(2023). Traffic Control Management using Image Processing and Networking. International Journal of Computer Engineering in Research Trends, 10(10), 37–43

Mohammed Adam Kunna Azrag, Rulfah Abdul Rahman, Jonardo Ann, , Suraya Masrom,K,Samunnisa .(2023).A Novel Blockchain-based Framework for Enhancing Supply Chain Management, International Journal of Computer Engineering in Research Trends.10(6), 22-2